Lucene search

K
archlinuxArchLinuxASA-201803-5
HistoryMar 06, 2018 - 12:00 a.m.

[ASA-201803-5] python-django: denial of service

2018-03-0600:00:00
security.archlinux.org
16

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

0.01 Low

EPSS

Percentile

83.3%

Arch Linux Security Advisory ASA-201803-5

Severity: Medium
Date : 2018-03-06
CVE-ID : CVE-2018-7536 CVE-2018-7537
Package : python-django
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-649

Summary

The package python-django before version 1.11.11-1 is vulnerable to
denial of service.

Resolution

Upgrade to 1.11.11-1.

pacman -Syu โ€œpython-django>=1.11.11-1โ€

The problems have been fixed upstream in version 1.11.11.

Workaround

None.

Description

  • CVE-2018-7536 (denial of service)

The django.utils.html.urlize() function was extremely slow to evaluate
certain inputs due to catastrophic backtracking vulnerabilities in two
regular expressions. The urlize() function is used to implement the
urlize and urlizetrunc template filters, which were thus vulnerable.
The problematic regular expressions are replaced with parsing logic
that behaves similarly.

  • CVE-2018-7537 (denial of service)

If django.utils.text.Truncatorโ€™s chars() and words() methods were
passed the html=True argument, they were extremely slow to evaluate
certain inputs due to a catastrophic backtracking vulnerability in a
regular expression. The chars() and words() methods are used to
implement the truncatechars_html and truncatewords_html template
filters, which were thus vulnerable.

Impact

A remote attacker is able to crash the application by providing
specially crafted input.

References

https://docs.djangoproject.com/en/dev/releases/1.11.11/
https://github.com/django/django/commit/8618271caa0b09daba39ff3b46567d33ae1e1d3a
https://github.com/django/django/commit/97b7dd59bb8d6163239061e2022153c3415d146d
https://security.archlinux.org/CVE-2018-7536
https://security.archlinux.org/CVE-2018-7537

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanypython-django<ย 1.11.11-1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

0.01 Low

EPSS

Percentile

83.3%